-
1
-
-
21644486314
-
-
Trusted Computing Group
-
Trusted Computing Group. TCG Specification Architecture Overview https://www.trustedcomputinggroup.org/groups/TCG_1_0_A rchitecture_Overview.pdf.
-
TCG Specification Architecture Overview
-
-
-
2
-
-
35148857043
-
-
Trusted Computing Group. TCG Software Stack (TSS) specification Version 1.2 https://www.trustedcomputinggroup.org/groups/TSS_Versio n_l [1].2_Level_1_FINAL.pdf.
-
Trusted Computing Group. TCG Software Stack (TSS) specification Version 1.2 https://www.trustedcomputinggroup.org/groups/TSS_Versio n_l [1].2_Level_1_FINAL.pdf.
-
-
-
-
3
-
-
35148884167
-
-
Huanguo Zhang, Jie Luo, Gang Jin, Fajiang Yu and Fei Yan. Development of Trusted Computing Research. Wuhan University Journal of Natural Science, Vol11, No.6, December 2006, pp. 14-20.
-
Huanguo Zhang, Jie Luo, Gang Jin, Fajiang Yu and Fei Yan. "Development of Trusted Computing Research." Wuhan University Journal of Natural Science, Vol11, No.6, December 2006, pp. 14-20.
-
-
-
-
4
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM Press
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. "Terra: a virtual machine-based platform for trusted computing." ASOSP, ACM Press, 2003, pp. 193-206.
-
(2003)
ASOSP
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
5
-
-
21644433634
-
Xen and the art of virtualization
-
ACMPress, NY, USA
-
P.Barham, B.Dragovic, K.Fraser, S.Hand, T.Harris, A.Ho, R.Neugebauer, I.Pratt, and A. Warfield. "Xen and the art of virtualization" SOSP03, ACMPress, NY, USA, 2003, pp. 164-177.
-
(2003)
SOSP03
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
34748921936
-
Building a MAC-based security architecture for the Xen open-source hypervisor
-
23629, IBM Research Division, June
-
R. Sailer, T. Jaeger, E. Valdez, R. Perez, S. Berger, J. L. Griffin, and L. van Doom. "Building a MAC-based security architecture for the Xen open-source hypervisor." Research Report RC 23629, IBM Research Division, June 2005.
-
(2005)
Research Report RC
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Perez, R.4
Berger, S.5
Griffin, J.L.6
van Doom, L.7
-
7
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
ACM Press, NY, USA
-
A.-R. Sadeghi and C. Stuble. "Property-based attestation for computing platforms: caring about properties, not mechanisms." NSPW04, ACM Press, NY, USA, 2005. pp. 67-77.
-
(2005)
NSPW04
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stuble, C.2
-
8
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
ACM Press, NY, USA
-
R. Sailer, T. Jaeger, X.Zhang, and L.van Doom. "Attestation-based policy enforcement for remote access." Conference on Computer and Communications Security, ACM Press, NY, USA, 2004, pp. 308-317.
-
(2004)
Conference on Computer and Communications Security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
van Doom, L.4
-
9
-
-
35148867396
-
-
W. Mao, H. Jin, and A. Martin. Innovations for grid security from trusted computing. In International Symposium on Grid Computing, 2005.
-
W. Mao, H. Jin, and A. Martin. "Innovations for grid security from trusted computing." In International Symposium on Grid Computing, 2005.
-
-
-
-
10
-
-
84885617227
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
ACM Press, NY, USA
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L.van Doom, and P.Khosla. "Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms", Symposium on Operating System Principles, ACM Press, NY, USA, 2005, pp. 1-16.
-
(2005)
Symposium on Operating System Principles
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doom, L.5
Khosla, P.6
-
11
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
May
-
A. Seshadri, A. Perrig,L. van Doom, and P. Khosla. "SWATT: Software-based attestation for embedded devices." In Proceedings of the IEEE Symposium on Security and Privacy, May 2004, pp. 272-282.
-
(2004)
In Proceedings of the IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
van Doom, L.3
Khosla, P.4
-
13
-
-
33748062337
-
PRIMA: Policy-Reduced Integrity Measurement Architecture
-
ACM Press, NY, USA, June
-
Trent Jaeger, Reiner Sailer, and Umesh Shankar. "PRIMA: Policy-Reduced Integrity Measurement Architecture." SACMAT 2006, ACM Press, NY, USA, June 2006, pp. 19-28.
-
(2006)
SACMAT 2006
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
14
-
-
34250346420
-
Daonity: Grid security with behaviour conformity from trusted computing
-
ACM Press, NY, USA, November
-
Wenbo Mao, Fei Yan, Chunrun Chen, "Daonity: grid security with behaviour conformity from trusted computing," STC06, ACM Press, NY, USA, November 2006, pp. 43-46.
-
(2006)
STC06
, pp. 43-46
-
-
Mao, W.1
Yan, F.2
Chen, C.3
|